When should an implementation attack be viewed as successful?
From MaRDI portal
Publication:2867256
DOI10.1007/978-3-642-42001-6_11zbMATH Open1320.94081OpenAlexW420179361MaRDI QIDQ2867256FDOQ2867256
Authors: Werner Schindler
Publication date: 10 December 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-42001-6_11
Recommendations
- Success through Confidence: Evaluating the Effectiveness of a Side-Channel Attack
- A key to success. Success exponents for side-channel distinguishers
- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks
- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model
- Side channel cryptanalysis of product ciphers
side-channel analysislattice-based cryptographyfault analysisexponent blindingalgebraic side-channel analysis
This page was built for publication: When should an implementation attack be viewed as successful?
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2867256)